• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Engineer manager shows intelligent industrial system with software and digital manufacturing, artificial intelligence technology of modern innovation.

MCi Protects Its Customers Worldwide With Quorum Cyber’s Enterprise-Grade Cybersecurity

May 30, 2023 TD Staff Leave a Comment

Serving state, local governments, and global Fortune 100 companies in the energy, mining, manufacturing, and chemicals industries, Management Controls, Inc. (MCi) needed to transform its cybersecurity to the world-class level expected by its long list of prestigious customers. As a software technology and services provider, MCi provides critical Software-as-a-Service (SaaS) solutions and its TRACK platform […]

Read More

MIcrosoft Entra External ID

Microsoft Announces Public Preview of Developer-Centric Platform Entra External ID​

May 26, 2023 Zachary Comeau Leave a Comment

Microsoft is launching new developer-centric capabilities for customer and partner identity experiences in Microsoft Entra External ID, which the company calls its next-generation customer identity and access management (CIAM) solution. In addition, Microsoft is making Microsoft Entra Verified ID easy to integrate into any application with the Microsoft Entra Verified ID SDK. Microsoft calls Entra […]

Read More

China, Hacking, Microsoft, Routers, Volt Typhoon

Microsoft, NSA Warn of Stealthy China-Sponsored Hacking Group Volt Typhoon

May 24, 2023 Zachary Comeau Leave a Comment

Microsoft is sounding the alarm on a group it calls Volt Typhoon, another state-sponsored hacking group based in China that is targeting critical infrastructure organizations and leveraging living-off-the-land techniques and proxying its network traffic through compromised network edge devices and routers to evade detection. Microsoft says Volt Typhoon is pursing development of capabilities that could […]

Read More

Red Hat Summit, AI, Enterprise Linux

Red Hat Summit 2023 Releases: AI, Automation, IT Management, Security

May 24, 2023 Zachary Comeau Leave a Comment

Red Hat is holding its annual Red Hat Summit event this week and judging by the enterprise open source software giant’s product announcements, the company is keying in on AI, automation, security and productivity enhancements. Like other tech giants, the company used its event to make important announcements in generative AI to help accelerate its […]

Read More

Windows 11, Windows 365 Boot, IT management, privacy, security,

Microsoft Releases Windows 365 Boot Preview, Windows 11 IT Management Features

May 24, 2023 Zachary Comeau Leave a Comment

Microsoft is beginning to roll out new features in Windows 11 designed to make managing and securing Windows 11 devices easier, as well as Windows 365 Boot to enable users to log directly not their Windows 365 Cloud PC and designate it as the primary Windows experience on their device. The Windows announcements came during […]

Read More

Tenable Splunk

Tenable, Splunk Launch Partnership for Risk Prioritization

May 23, 2023 Zachary Comeau Leave a Comment

Vulnerability management provider Tenable and IT management platform Splunk have launched a new partnership designed to help security teams better correlate events, take action on flaws and meet compliance standards. The partnership combines Tenable’s vulnerability management insights with Splunk’s log and flow consolidation capabilities to help simplify risk prioritization, accelerate threat response and reduce overall […]

Read More

Dell, Cybersecurity, Security, Zero Trust, Project Fort Zero

Dell’s Project Fort Zero Will be a Fully Configured Zero Trust Solution

May 23, 2023 Zachary Comeau Leave a Comment

Dell is aiming to provide an end-to-end zero trust security solution with Project Fort Zero, a new fully configured solution designed to lower the barrier to entry for zero trust adoption. According to Dell, the Project Fort Zero solution builds on the momentum of the company’s Zero Trust Center of Excellence and partner ecosystem to […]

Read More

Zero Trust

First Steps to Take for Zero Trust Implementation

May 23, 2023 Zachary Comeau Leave a Comment

Zero trust has emerged as a key IT security policy that is designed to help organizations be more secure by essentially assuming a breach has already occurred and requiring a user, device, application and transaction to be authenticated and verified each time they access an application, not just at the network perimeter. However, implementing zero […]

Read More

Barracuda ESG

Barracuda Launches New SASE Platform for Businesses, MSPs

May 22, 2023 Zachary Comeau Leave a Comment

Cybersecurity solutions provider Barracuda Networks is launching Barracuda SecureEdge, a new SASE solution designed to make hybrid and remote work environments easier to secure with integration into SD-WAN, firewall, zero trust and secure web gateway solutions. According to the Campbell, Calif. cloud-first security company, its single-vendor SASE service is designed to help businesses and managed […]

Read More

Business email compromise

Business Email Compromise is on the Rise

May 22, 2023 Zachary Comeau Leave a Comment

Business email compromise has emerged as a critical threat as threat actors shift their tactics and increase the sophistication of attacks designed to takeover business emails, including leveraging residential IP addresses to hide the attacks, Microsoft says in a new Cyber Signals report. The report, the fourth such edition of Microsoft’s cybersecurity research report, finds […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.